Skip to main content
Log in

CBIDM: Controller Based Intelligent Detection and Mitigation Approach for Interest Flooding Attack in Named Data Networking

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Named Data Networking (NDN) aims to fix the flaws of TCP/IP networks. NDN ensures provenance and integrity by requiring publishers to sign each content, which consumers can verify. This makes NDN more secure than TCP/IP. However, NDN is prone to Interest Flooding Attacks (IFA). In IFA, attackers fill the Pending Interest Tables (PITs) of NDN routers with fake entries by requesting non-existent content. Many methods have been proposed to counter IFA. Most of these methods rely on statistical thresholds, which reduce detection accuracy. Our previous work showed that using machine learning improves IFA detection accuracy. This paper introduces a Controller-Based Intelligent Detection and Mitigation (CBIDM) approach for online IFA detection. It deploys a trained Artificial Neural Network (ANN) detector on NDN routers. Additionally, a traceback-based mitigation method is applied using a central controller. The controller collects topology and attack data from each router. Routers then use this data for IFA mitigation. The proposed approach is more efficient than existing methods in terms of data packets received and satisfaction ratio.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Algorithm 6
Fig. 10
Fig. 11

Similar content being viewed by others

Data availability

Not Applicable.

Code availability

Not Applicable.

References

  1. Peng G. CDN: Content distribution network. arXiv preprint arXiv:cs/0411069; 2004.

  2. Ghodsi A, Shenker S, Koponen T, Singla A, Raghavan B, Wilcox J. Information-centric networking: seeing the forest for the trees. In: Proceedings of the 10th ACM workshop on hot topics in networks; 2011. p. 1–6

  3. Koponen T, Chawla M, Chun B-G, Ermolinskiy A, Kim KH, Shenker S, Stoica I. A data-oriented (and beyond) network architecture. In: Proceedings of the 2007 conference on applications, technologies, architectures, and protocols for computer communications; 2007. p. 181–192

  4. García G, Beben A, Ramón FJ, Maeso A, Psaras I, Pavlou G, Wang N, Śliwiński J, Spirou S, Soursos S, et al. Comet: Content mediator architecture for content-aware networks. In: 2011 Future Network & Mobile Summit. IEEE; 2011. p. 1–8.

  5. Jacobson V, Mosko M, Smetters D, Garcia-Luna-Aceves J. Content-centric networking. Whitepaper, Palo Alto Research Center; 2007. p. 2–4.

  6. Zhang L, Estrin D, Burke J, Jacobson V, Thornton JD, Smetters DK, Zhang B, Tsudik G, Massey D, Papadopoulos C, et al. Named data networking (NDN) project. Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC; 2010. p. 157–158.

  7. Kumar N, Singh AK, Aleem A, Srivastava S. Security attacks in named data networking: a review and research directions. J Comput Sci Technol. 2019;34:1319–50.

    Article  Google Scholar 

  8. Ahmad S, Mehfuz S, Mebarek-Oudina F, Beg J. RSM analysis based cloud access security broker: a systematic literature review. Clust Comput. 2022;25(5):3733–63.

    Article  Google Scholar 

  9. Gasti P, Tsudik G, Uzun E, Zhang L. Dos and ddos in named data networking. In: 2013 22nd International Conference on Computer Communication and Networks (ICCCN). IEEE; 2013. p. 1–7.

  10. Afanasyev A, Mahadevan P, Moiseenko I, Uzun E, Zhang L. Interest flooding attack and countermeasures in named data networking. In: 2013 IFIP Networking Conference. IEEE; 2013. p. 1–9.

  11. Dai H, Wang Y, Fan J, Liu B. Mitigate DDoS attacks in NDN by interest traceback. In: 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE; 2013. p. 381–386.

  12. Compagno A, Conti M, Gasti P, Tsudik G. Poseidon: Mitigating interest flooding DDoS attacks in named data networking. In: 38th annual IEEE conference on local computer networks. IEEE; 2013. p. 630–638

  13. Wang K, Zhou H, Qin Y, Chen J, Zhang H, Decoupling malicious interests from pending interest table to mitigate interest flooding attacks. In: 2013 IEEE Globecom Workshops (GC Wkshps). IEEE; 2013. p. 963–8.

  14. Xin Y, Li Y, Wang W, Li W, Chen X. Detection of collusive interest flooding attacks in named data networking using wavelet analysis. In: MILCOM 2017-2017 IEEE Military Communications Conference (MILCOM). IEEE; 2017. p. 557–562.

  15. Kumar N, Singh AK, Srivastava S. Evaluating machine learning algorithms for detection of interest flooding attack in named data networking. In: Proceedings of the 10th International Conference on Security of Information and Networks; 2017. p. 299–302.

  16. Kumar N, Singh AK, Srivastava S. Feature selection for interest flooding attack in named data networking. Int J Comput Appl. 2021;43(6):537–46.

    Google Scholar 

  17. Afanasyev A, Moiseenko I, Zhang L, et al. ndnsim: NDN simulator for ns-3. Technical Report, vol. 4. Los Angeles: University of California; 2012. p. 1–7.

  18. Team, N.: NDN Packet format specification. Named Data Networking; 2023. https://docs.named-data.net/NDN-packet-spec/current/

  19. Benarfa A, Hassan M, Compagno A, Losiouk E, Yagoubi MB, Conti M. Chokifa: a new detection and mitigation approach against interest flooding attacks in NDN. In: Wired/Wireless Internet Communications: 17th IFIP WG 6.2 International Conference, WWIC 2019, Bologna, Italy, June 17–18, 2019, Proceedings 17. Springer; 2019. p. 53–65.

  20. Benarfa A, Hassan M, Losiouk E, Compagno A, Yagoubi MB, Conti M. Chokifa+: an early detection and mitigation approach against interest flooding attacks in NDN. Int J Inf Secur. 2021;20:269–85.

    Article  Google Scholar 

  21. Benmoussa A, Karim Tahari A, Kerrache CA, Lagraa N, Lakas A, Hussain R, Ahmad F. MSIDN: mitigation of sophisticated interest flooding-based DDoS attacks in named data networking. Future Gener Comput Syst. 2020;107:293–306.

    Article  Google Scholar 

  22. Wu Z, Peng S, Liu L, Yue M. Detection of improved collusive interest flooding attacks using BO-GBM fusion algorithm in NDN. IEEE Trans Netw Sci Eng. 2022;10(1):239–52.

    Article  Google Scholar 

  23. Zhang Y, Guo X-X, Ma M. Admbifa: Accurate detection and mitigation of blended interest flooding attacks in NDNS. In: 2023 IEEE 24th International Conference on High Performance Switching and Routing (HPSR). IEEE; 2023. p. 56–61

  24. Xiao P, Qu W, Qi H, Li Z, Xu Y. The SDN controller placement problem for WAN. In: 2014 IEEE/CIC International Conference on Communications in China (ICCC). IEEE; 2014. p. 220–224.

  25. Riley GF, Henderson TR. The ns-3 network simulator. In: Modeling and tools for network simulation. Berlin: Springer; 2010. p. 15–34.

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Naveen Kumar.

Ethics declarations

Conflict of interest

None.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar, N., Aleem, A. CBIDM: Controller Based Intelligent Detection and Mitigation Approach for Interest Flooding Attack in Named Data Networking. SN COMPUT. SCI. 5, 1008 (2024). https://doi.org/10.1007/s42979-024-03350-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-024-03350-x

Keywords

Navigation